Filter by
The language used throughout the course, in both instruction and assessments.
Results for "information systems security"
- Status: [object Object]
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
Skills you'll gain: Data Ethics, Incident Response, Security Awareness, Computer Security Incident Management, Incident Management, Cybersecurity, Security Management, Cyber Security Policies, Computer Security Awareness Training, Artificial Intelligence, Technical Communication
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
Skills you'll gain: Incident Response, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Risk Management Framework, Threat Management, Risk Management, Security Controls, Information Systems Security, Cybersecurity, Virtualization and Virtual Machines, Information Systems, Vulnerability Assessments, Cloud Computing
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Data Security, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Role-Based Access Control (RBAC), Virtual Machines
Illinois Tech
Skills you'll gain: Firewall, Microsoft Windows, Operating Systems, Linux, Linux Administration, System Configuration, Network Security, Authorization (Computing), System Monitoring, System Software, Windows Servers, Systems Administration, File Management, Data Security, Identity and Access Management
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Containerization, Cloud Applications, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Management, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Network Planning And Design
Skills you'll gain: Bash (Scripting Language), Linux Commands, Command-Line Interface, Operating Systems, SQL, Linux, Cybersecurity, Linux Administration, Databases, Computer Hardware, Relational Databases, File Systems, User Accounts
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Cloud Computing, Firewall, Network Security, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud
Searches related to information systems security
In summary, here are 10 of our most popular information systems security courses
- IBM Data Analyst: IBM
- Put It to Work: Prepare for Cybersecurity Jobs: Google
- IBM DevOps and Software Engineering: IBM
- Incident Response and Risk Management: Packt
- Ask Questions to Make Data-Driven Decisions: Google
- Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
- OS Security: Illinois Tech
- Network Defense Essentials (NDE): EC-Council
- Preparing for Google Cloud Certification: Cloud Architect: Google Cloud
- Tools of the Trade: Linux and SQL: Google